Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Namefirefox
Version80.0-r0
Qualifiers
arch x86_64
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version81.0-r0
Latest_non_vulnerable_version119.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-e3j5-kyhm-7ye1
vulnerability_id VCID-e3j5-kyhm-7ye1
summary When processing a MAR update file, after the signature has been validated, an invalid name length could result in a heap overflow, leading to memory corruption and potentially arbitrary code execution. Within Firefox as released by Mozilla, this issue is only exploitable with the Mozilla-controlled signing key.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15667.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15667
reference_id
reference_type
scores
0
value 0.00891
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-01T12:55:00Z
1
value 0.00891
scoring_system epss
scoring_elements 0.75555
published_at 2026-04-12T12:55:00Z
2
value 0.00891
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-09T12:55:00Z
3
value 0.00891
scoring_system epss
scoring_elements 0.75577
published_at 2026-04-11T12:55:00Z
4
value 0.00891
scoring_system epss
scoring_elements 0.75493
published_at 2026-04-02T12:55:00Z
5
value 0.00891
scoring_system epss
scoring_elements 0.75524
published_at 2026-04-04T12:55:00Z
6
value 0.00891
scoring_system epss
scoring_elements 0.75504
published_at 2026-04-07T12:55:00Z
7
value 0.00891
scoring_system epss
scoring_elements 0.75547
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15667
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1884474
reference_id 1884474
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1884474
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-15667
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e3j5-kyhm-7ye1
1
url VCID-jtsz-m5jr-ebdc
vulnerability_id VCID-jtsz-m5jr-ebdc
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15664.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15664
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-13T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58904
published_at 2026-04-12T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58922
published_at 2026-04-11T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58905
published_at 2026-04-09T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58899
published_at 2026-04-08T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.58781
published_at 2026-04-01T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58846
published_at 2026-04-07T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.58878
published_at 2026-04-04T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58856
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872531
reference_id 1872531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872531
6
reference_url https://security.gentoo.org/glsa/202008-16
reference_id GLSA-202008-16
reference_type
scores
url https://security.gentoo.org/glsa/202008-16
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
reference_id mfsa2020-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
reference_id mfsa2020-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
reference_id mfsa2020-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
reference_id mfsa2020-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
13
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
14
reference_url https://access.redhat.com/errata/RHSA-2020:3556
reference_id RHSA-2020:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3556
15
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
16
reference_url https://access.redhat.com/errata/RHSA-2020:3558
reference_id RHSA-2020:3558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3558
17
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
18
reference_url https://access.redhat.com/errata/RHSA-2020:3631
reference_id RHSA-2020:3631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3631
19
reference_url https://access.redhat.com/errata/RHSA-2020:3632
reference_id RHSA-2020:3632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3632
20
reference_url https://access.redhat.com/errata/RHSA-2020:3633
reference_id RHSA-2020:3633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3633
21
reference_url https://access.redhat.com/errata/RHSA-2020:3634
reference_id RHSA-2020:3634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3634
22
reference_url https://access.redhat.com/errata/RHSA-2020:3643
reference_id RHSA-2020:3643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3643
23
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-15664
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jtsz-m5jr-ebdc
2
url VCID-k4a4-f1as-x3bj
vulnerability_id VCID-k4a4-f1as-x3bj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-13T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-11T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-12T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.34934
published_at 2026-04-01T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35132
published_at 2026-04-02T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35161
published_at 2026-04-04T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-07T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35085
published_at 2026-04-08T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35111
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
reference_id 1853983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-12400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4a4-f1as-x3bj
3
url VCID-kbpr-dnqh-37fu
vulnerability_id VCID-kbpr-dnqh-37fu
summary Mozilla developers Jason Kratzer, Christian Holler, and Byron Campen reported memory safety bugs present in Firefox 79 and Firefox ESR 78.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15670.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15670
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59651
published_at 2026-04-13T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59603
published_at 2026-04-07T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59654
published_at 2026-04-08T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59667
published_at 2026-04-09T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59687
published_at 2026-04-11T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.5967
published_at 2026-04-12T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59536
published_at 2026-04-01T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59609
published_at 2026-04-02T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59634
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15670
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872533
reference_id 1872533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872533
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
reference_id mfsa2020-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
reference_id mfsa2020-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
8
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-15670
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbpr-dnqh-37fu
4
url VCID-mx8t-s47w-wud5
vulnerability_id VCID-mx8t-s47w-wud5
summary When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.69005
published_at 2026-04-13T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.69049
published_at 2026-04-11T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.69034
published_at 2026-04-12T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.6894
published_at 2026-04-01T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.68958
published_at 2026-04-02T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.68978
published_at 2026-04-04T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.68957
published_at 2026-04-07T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-08T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69027
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
reference_id 1826187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
6
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
7
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
10
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-6829
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mx8t-s47w-wud5
5
url VCID-rk7t-zjzg-eqar
vulnerability_id VCID-rk7t-zjzg-eqar
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40566
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40604
published_at 2026-04-09T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-12T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-01T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40595
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40544
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
reference_id 1851294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-12401
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk7t-zjzg-eqar
6
url VCID-rx46-z7x6-u3dc
vulnerability_id VCID-rx46-z7x6-u3dc
summary When trying to load a non-video in an audio/video context the exact status code (200, 302, 404, 500, 412, 403, etc.) was disclosed via the MediaError Message. This level of information leakage is inconsistent with the standardized onerror/onsuccess disclosure and can lead to inferring login status to services or device discovery on a local network among other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15666
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.59025
published_at 2026-04-13T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59043
published_at 2026-04-09T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.59062
published_at 2026-04-11T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.59044
published_at 2026-04-12T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.58922
published_at 2026-04-01T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.58997
published_at 2026-04-02T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.59019
published_at 2026-04-04T12:55:00Z
7
value 0.00373
scoring_system epss
scoring_elements 0.58985
published_at 2026-04-07T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.59037
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15666
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
4
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-15666
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rx46-z7x6-u3dc
7
url VCID-tvsh-whx8-6qdp
vulnerability_id VCID-tvsh-whx8-6qdp
summary Firefox did not reset the address bar after the beforeunload dialog was shown if the user chose to remain on the page. This could have resulted in an incorrect URL being shown when used in conjunction with other unexpected browser behaviors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15665.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15665
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40289
published_at 2026-04-01T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40321
published_at 2026-04-13T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40378
published_at 2026-04-11T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.4034
published_at 2026-04-12T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40354
published_at 2026-04-02T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40379
published_at 2026-04-04T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40304
published_at 2026-04-07T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40355
published_at 2026-04-08T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40367
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15665
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1885176
reference_id 1885176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1885176
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-15665
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvsh-whx8-6qdp
8
url VCID-vun4-z8ju-gbbc
vulnerability_id VCID-vun4-z8ju-gbbc
summary If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with administrative privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with system privileges.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15663
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82141
published_at 2026-04-13T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82107
published_at 2026-04-04T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82103
published_at 2026-04-07T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.8213
published_at 2026-04-08T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-09T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82156
published_at 2026-04-11T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82147
published_at 2026-04-12T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82074
published_at 2026-04-01T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82086
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15663
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872530
reference_id 1872530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872530
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
reference_id mfsa2020-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
reference_id mfsa2020-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
reference_id mfsa2020-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
reference_id mfsa2020-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-15663
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vun4-z8ju-gbbc
9
url VCID-w1a1-6e1k-guh6
vulnerability_id VCID-w1a1-6e1k-guh6
summary A lock was missing when accessing a data structure and importing certificate information into the trust database.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15668
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42696
published_at 2026-04-13T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42728
published_at 2026-04-09T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42749
published_at 2026-04-11T12:55:00Z
3
value 0.00205
scoring_system epss
scoring_elements 0.42713
published_at 2026-04-12T12:55:00Z
4
value 0.00205
scoring_system epss
scoring_elements 0.42625
published_at 2026-04-01T12:55:00Z
5
value 0.00205
scoring_system epss
scoring_elements 0.42695
published_at 2026-04-02T12:55:00Z
6
value 0.00205
scoring_system epss
scoring_elements 0.42722
published_at 2026-04-04T12:55:00Z
7
value 0.00205
scoring_system epss
scoring_elements 0.42662
published_at 2026-04-07T12:55:00Z
8
value 0.00205
scoring_system epss
scoring_elements 0.42714
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15668
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
4
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2020-15668
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w1a1-6e1k-guh6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community