{"url":"http://public2.vulnerablecode.io/api/packages/480650?format=json","purl":"pkg:apk/alpine/firefox-esr@68.10.0-r0?arch=armhf&distroversion=v3.22&reponame=community","type":"apk","namespace":"alpine","name":"firefox-esr","version":"68.10.0-r0","qualifiers":{"arch":"armhf","distroversion":"v3.22","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"78.1.0-r0","latest_non_vulnerable_version":"115.6.0-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33644?format=json","vulnerability_id":"VCID-1s5n-6p4c-q3ds","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12417.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12417","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64842","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64815","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64846","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64696","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64739","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6482","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64809","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64818","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853014","reference_id":"1853014","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853014"},{"reference_url":"https://security.gentoo.org/glsa/202007-09","reference_id":"GLSA-202007-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-09"},{"reference_url":"https://security.gentoo.org/glsa/202007-10","reference_id":"GLSA-202007-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24","reference_id":"mfsa2020-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25","reference_id":"mfsa2020-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26","reference_id":"mfsa2020-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29","reference_id":"mfsa2020-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2825","reference_id":"RHSA-2020:2825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2826","reference_id":"RHSA-2020:2826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2827","reference_id":"RHSA-2020:2827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2828","reference_id":"RHSA-2020:2828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2906","reference_id":"RHSA-2020:2906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2907","reference_id":"RHSA-2020:2907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3038","reference_id":"RHSA-2020:3038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3046","reference_id":"RHSA-2020:3046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3046"},{"reference_url":"https://usn.ubuntu.com/4408-1/","reference_id":"USN-4408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4408-1/"},{"reference_url":"https://usn.ubuntu.com/4421-1/","reference_id":"USN-4421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4421-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/480650?format=json","purl":"pkg:apk/alpine/firefox-esr@68.10.0-r0?arch=armhf&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.10.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2020-12417"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1s5n-6p4c-q3ds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33649?format=json","vulnerability_id":"VCID-72hn-2x6h-tbde","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12421.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12421","reference_id":"","reference_type":"","scores":[{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77941","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77974","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77982","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77851","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77911","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77949","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853018","reference_id":"1853018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853018"},{"reference_url":"https://security.gentoo.org/glsa/202007-09","reference_id":"GLSA-202007-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-09"},{"reference_url":"https://security.gentoo.org/glsa/202007-10","reference_id":"GLSA-202007-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24","reference_id":"mfsa2020-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25","reference_id":"mfsa2020-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26","reference_id":"mfsa2020-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29","reference_id":"mfsa2020-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2824","reference_id":"RHSA-2020:2824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2825","reference_id":"RHSA-2020:2825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2826","reference_id":"RHSA-2020:2826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2827","reference_id":"RHSA-2020:2827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2828","reference_id":"RHSA-2020:2828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2906","reference_id":"RHSA-2020:2906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2907","reference_id":"RHSA-2020:2907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2966","reference_id":"RHSA-2020:2966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3038","reference_id":"RHSA-2020:3038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3046","reference_id":"RHSA-2020:3046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3046"},{"reference_url":"https://usn.ubuntu.com/4408-1/","reference_id":"USN-4408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4408-1/"},{"reference_url":"https://usn.ubuntu.com/4421-1/","reference_id":"USN-4421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4421-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/480650?format=json","purl":"pkg:apk/alpine/firefox-esr@68.10.0-r0?arch=armhf&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.10.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2020-12421"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-72hn-2x6h-tbde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33645?format=json","vulnerability_id":"VCID-b4fq-m97e-eybr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12418.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12418","reference_id":"","reference_type":"","scores":[{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79203","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.7921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79252","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.7926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0124","scoring_system":"epss","scoring_elements":"0.79249","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853015","reference_id":"1853015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853015"},{"reference_url":"https://security.gentoo.org/glsa/202007-09","reference_id":"GLSA-202007-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-09"},{"reference_url":"https://security.gentoo.org/glsa/202007-10","reference_id":"GLSA-202007-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24","reference_id":"mfsa2020-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25","reference_id":"mfsa2020-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26","reference_id":"mfsa2020-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29","reference_id":"mfsa2020-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2824","reference_id":"RHSA-2020:2824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2825","reference_id":"RHSA-2020:2825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2826","reference_id":"RHSA-2020:2826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2827","reference_id":"RHSA-2020:2827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2828","reference_id":"RHSA-2020:2828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2906","reference_id":"RHSA-2020:2906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2907","reference_id":"RHSA-2020:2907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2966","reference_id":"RHSA-2020:2966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3038","reference_id":"RHSA-2020:3038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3046","reference_id":"RHSA-2020:3046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3046"},{"reference_url":"https://usn.ubuntu.com/4408-1/","reference_id":"USN-4408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4408-1/"},{"reference_url":"https://usn.ubuntu.com/4421-1/","reference_id":"USN-4421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4421-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/480650?format=json","purl":"pkg:apk/alpine/firefox-esr@68.10.0-r0?arch=armhf&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.10.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2020-12418"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4fq-m97e-eybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33646?format=json","vulnerability_id":"VCID-fsvy-jfhn-1ydz","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12419.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12419","reference_id":"","reference_type":"","scores":[{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6438","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64356","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64379","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64232","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64339","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64345","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853016","reference_id":"1853016","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853016"},{"reference_url":"https://security.gentoo.org/glsa/202007-09","reference_id":"GLSA-202007-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-09"},{"reference_url":"https://security.gentoo.org/glsa/202007-10","reference_id":"GLSA-202007-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24","reference_id":"mfsa2020-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25","reference_id":"mfsa2020-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26","reference_id":"mfsa2020-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29","reference_id":"mfsa2020-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2824","reference_id":"RHSA-2020:2824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2825","reference_id":"RHSA-2020:2825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2826","reference_id":"RHSA-2020:2826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2827","reference_id":"RHSA-2020:2827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2828","reference_id":"RHSA-2020:2828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2906","reference_id":"RHSA-2020:2906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2907","reference_id":"RHSA-2020:2907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2966","reference_id":"RHSA-2020:2966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3038","reference_id":"RHSA-2020:3038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3046","reference_id":"RHSA-2020:3046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3046"},{"reference_url":"https://usn.ubuntu.com/4408-1/","reference_id":"USN-4408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4408-1/"},{"reference_url":"https://usn.ubuntu.com/4421-1/","reference_id":"USN-4421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4421-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/480650?format=json","purl":"pkg:apk/alpine/firefox-esr@68.10.0-r0?arch=armhf&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.10.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2020-12419"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fsvy-jfhn-1ydz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33647?format=json","vulnerability_id":"VCID-mmvb-w19n-97a3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12420.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12420","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62984","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62949","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62997","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853017","reference_id":"1853017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1853017"},{"reference_url":"https://security.gentoo.org/glsa/202007-09","reference_id":"GLSA-202007-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-09"},{"reference_url":"https://security.gentoo.org/glsa/202007-10","reference_id":"GLSA-202007-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24","reference_id":"mfsa2020-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-24"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25","reference_id":"mfsa2020-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26","reference_id":"mfsa2020-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29","reference_id":"mfsa2020-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2824","reference_id":"RHSA-2020:2824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2825","reference_id":"RHSA-2020:2825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2826","reference_id":"RHSA-2020:2826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2827","reference_id":"RHSA-2020:2827","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2827"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2828","reference_id":"RHSA-2020:2828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2906","reference_id":"RHSA-2020:2906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2907","reference_id":"RHSA-2020:2907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2966","reference_id":"RHSA-2020:2966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3038","reference_id":"RHSA-2020:3038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3046","reference_id":"RHSA-2020:3046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3046"},{"reference_url":"https://usn.ubuntu.com/4408-1/","reference_id":"USN-4408-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4408-1/"},{"reference_url":"https://usn.ubuntu.com/4421-1/","reference_id":"USN-4421-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4421-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/480650?format=json","purl":"pkg:apk/alpine/firefox-esr@68.10.0-r0?arch=armhf&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.10.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2020-12420"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmvb-w19n-97a3"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@68.10.0-r0%3Farch=armhf&distroversion=v3.22&reponame=community"}